Nightfall is the industry's first cloud-native data protection platform. Nightfall uses machine learning to discover, classify, and protect sensitive data like PII, PHI, and credentials. Nightfall integrates natively with cloud apps like Slack, GitHub, Google Drive, Confluence, and Jira, as well as provides a set of APIs for embedding best-in-class content inspection technology anywhere.
The Nightfall Developer Platform is a set of APIs developers can use to build data classification and protection into any application or service. This utility is powered by the Developer Platform. It's free to get started with the Developer Platform. Sign up or read the API Docs.
The report is sent via email as a CSV export. The report shows exactly what types of sensitive data are found and where in your Intercom instance, so you can easily track it down. The fields include the item type (e.g. File), Intercom ID, Intercom permalink, the Detector (e.g. Credit Card Number), detection confidence (e.g. Very Likely), the character locations of the sensitive data, and more. The email will also contain a high level summary of the scan.
Without inputting your own Nightfall API key, this free utility will have the following limitations: up to 500 items (e.g. files) or 500 MB of data will be scanned, and the first 100 sensitive findings will be outputted in the report.
These limitations don't apply if you input your own Nightfall API key, so we highly recommend doing so. In other words, with your own API key, you'll be able to run a complete scan. You can create an API key on your Nightfall Dashboard.
Pricing for the Developer Platform is based on the amount of data scanned by Nightfall. The Free plan (default) provides 3 GB of data scanned per month for free. From there you can choose to upgrade to the Usage plan to pay as you go, which starts at $3 per GB scanned and scales down with volume. Please see the Pricing page in the API Docs for more details.
The max size for individual files for this scanner is 20 MB. The service may filter high volumes of noise in the event that your detection rules may benefit from further tuning, and scans may terminate early if they are generating a very high volume of results, so that you can fine tune your detection rules prior to re-running the scan and consuming data volume. Similarly, results may be truncated to respect the max file size of email attachments and so files are openable.